Check Point’s Daniel Wiley on Balancing Technology and Human Analytics in Cybersecurity
Jun 12, 2024
In this episode of the Detection at Scale podcast, Jack speaks to Daniel Wiley, Head of Threat Management and Chief Security Advisor at Check Point Software, to discuss the intricacies of balancing technology and human analytics in cybersecurity.
Daniel shares his experiences in building three successful internal startups at Check Point and emphasizes the importance of continuous learning throughout one’s career. He also touches on effective incident response strategies for small- to medium-sized businesses, and the vital role of adaptable data schemas in managing large-scale security operations.
Topics discussed:
The highs and lows experienced in the cybersecurity startup journey, including the importance of quick decision-making and team-building.
Strategies for developing effective IR playbooks tailored for small- to medium-sized businesses to handle security threats efficiently.
The integration of machine analytics and human expertise to manage and interpret large volumes of cybersecurity data.
Managing 24/7 global SOCs, including the challenges of shift rotations and ensuring analysts are not overloaded.
Techniques for determining which data is crucial for cybersecurity efforts and how to handle terabytes of data per second.
The necessity of ongoing education and staying updated with the latest in cybersecurity to maintain effectiveness in the field.
The significance of hiring the right team from the start and making swift, decisive personnel changes when necessary.
Check Point's focus on maintaining high operational margins and its impact on the business's success and sustainability.
By continuing to use this website you consent to our use of cookies.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.